Follow
Chin Ho Lee
Title
Cited by
Cited by
Year
Limits of provable security for homomorphic encryption
A Bogdanov, CH Lee
Annual Cryptology Conference, 111-128, 2013
332013
Homomorphic encryption from codes
A Bogdanov, CH Lee
arXiv preprint arXiv:1111.4301, 2011
292011
Bounded independence plus noise fools products
E Haramaty, CH Lee, E Viola
SIAM Journal on Computing 47 (2), 493-523, 2018
262018
Polynomial-time trace reconstruction in the smoothed complexity model
X Chen, A De, CH Lee, RA Servedio, S Sinha
ACM Transactions on Algorithms (TALG), 2020
232020
Fourier bounds and pseudorandom generators for product tests
CH Lee
34th Computational Complexity Conference (CCC 2019), 2019
212019
More on bounded independence plus noise: Pseudorandom generators for read-once polynomials
CH Lee, E Viola
Theory of Computing 16 (1), 1-50, 2020
202020
Some limitations of the sum of small-bias distributions
CH Lee, E Viola
Theory of Computing 13 (1), 1-23, 2017
132017
Fractional pseudorandom generators from any fourier level
E Chattopadhyay, J Gaitonde, CH Lee, S Lovett, A Shetty
arXiv preprint arXiv:2008.01316, 2020
122020
The coin problem for product tests
CH Lee, E Viola
ACM Transactions on Computation Theory (TOCT) 10 (3), 1-10, 2018
112018
Near-Optimal Average-Case Approximate Trace Reconstruction from Few Traces
X Chen, A De, CH Lee, RA Servedio, S Sinha
Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2022
102022
Fourier Growth of Regular Branching Programs
CH Lee, E Pyne, S Vadhan
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2022
92022
Polynomial-time trace reconstruction in the low deletion rate regime
X Chen, A De, CH Lee, RA Servedio, S Sinha
12th Innovations in Theoretical Computer Science Conference (ITCS 2021), 2021
92021
Fourier Growth of Structured 𝔽₂-Polynomials and Applications
J Błasiok, P Ivanov, Y Jin, CH Lee, RA Servedio, E Viola
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2021
72021
Bounded independence versus symmetric tests
R Boppana, J Håstad, CH Lee, E Viola
ACM Transactions on Computation Theory (TOCT) 11 (4), 1-27, 2019
72019
Homomorphic evaluation requires depth
A Bogdanov, CH Lee
Theory of Cryptography Conference (TCC 2016A), 2016
6*2016
On the Power of Regular and Permutation Branching Programs
CH Lee, E Pyne, S Vadhan
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2023
32023
Approximate Trace Reconstruction from a Single Trace
X Chen, A De, CH Lee, RA Servedio, S Sinha
Proceedings of the 2023 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2023
12023
Bounded independence vs. moduli
R Boppana, J Hastad, CH Lee, E Viola
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–18